Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 01:37
Behavioral task
behavioral1
Sample
JaffaCakes118_092f96b026c431cee62885e84342035a.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_092f96b026c431cee62885e84342035a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_092f96b026c431cee62885e84342035a.html
-
Size
138KB
-
MD5
092f96b026c431cee62885e84342035a
-
SHA1
ca577618c7a2db3f77f2c213892c814c2488f1d7
-
SHA256
bce79345c24ade563a09ed8186ab797ce133b54f7137b970a064ca94db488a59
-
SHA512
6c42c5f542354c41d4210b38e96489743b4fad2579c21e11bcc3d76392771452380e483c3b45d137feb7d900dc816c082b3e1ef21be7e12a12c9fd10d7ed2dec
-
SSDEEP
768:22k1ATx+Bw24Tp7VD6iciXhW3VI0Hoy57EUJ3uCmWDrODQPydd7rxq0pa7XE6cVV:2mHD6ie3Vvo1UJdcFpa7XHcDO0tnxF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 4556 msedge.exe 4556 msedge.exe 2912 identity_helper.exe 2912 identity_helper.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2864 4556 msedge.exe 83 PID 4556 wrote to memory of 2864 4556 msedge.exe 83 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 3140 4556 msedge.exe 84 PID 4556 wrote to memory of 2868 4556 msedge.exe 85 PID 4556 wrote to memory of 2868 4556 msedge.exe 85 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86 PID 4556 wrote to memory of 3572 4556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_092f96b026c431cee62885e84342035a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcc2046f8,0x7ffbcc204708,0x7ffbcc2047182⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3438937113648925801,12365780236471014534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
395B
MD5d34b0872b3a7135160f2b9844cca6f5d
SHA16d5c93754b250f68f0b070d2462da2beebfaf3ef
SHA2567428d4e4111aa1469abf5fc387b1043d1f6e13f7b1b95783870839edb6a0b306
SHA512829ba2588c1fa601303d562f9e84a0d0e3baf3052449aa02a17ba7a58576f4f46819d4b2d0c5b8df1f3381f3659c5f5a570cf48708abfd671028f8ca1c23e50e
-
Filesize
5KB
MD561abc87efb713af806ed5457a438c4a5
SHA178991ac00c916da947914274a3a83c5c89f64550
SHA256711d48d217e48e72a68ebf0f2628c9cf4534379b4a87c30eaf096ba650ad62ff
SHA51233679aa922e6a09d51a4c505723e072f97433c668c4e2d10964d4cd2fcc6544252362ee51fa7817c595777cdac4f5c3ded109326ae4f188421713e6b01f4d5ae
-
Filesize
6KB
MD5d5de20ef0722fc34ae8dee4f2f8f64fc
SHA1907fe83b4568e2e6241209898c0e9f72786e873e
SHA25610082718820f981779b33cdaf82131f5e60ba0603a12f34f85853795c16728ad
SHA512f430fefd6d9b3afaacc42f6199745c1a1f27a78745b4769459864a59c35033a1db26eae06cb8ee92b185abb7fc9116a18efcedd0b6854ef88f6b775729ec799c
-
Filesize
6KB
MD5ce46fec04ea74f0ab95f4698332ef998
SHA1020a33dfeb93be6abce82a3daab5883775d838ca
SHA256f344db48d23e8b2849e569422f72aff4b4edefbcfa360f4cf3b7760d42df31e1
SHA5120d5bb84a824c826b07ef53454b17eba833dd42b59760f6b158103ca179ec40b0b8807d808835c7c80665afa554daef426abd2b70cb574abde481bdbd9cd696e3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD59896491661569f476e1538864a42c453
SHA121df6602a1d34f7f850a3b8641e3670738230a64
SHA256297c0f8def560255ea85472aa3b74033991116d9350e589c6c283ac3f04c4133
SHA512551f8b6f0c592548e6de1b8780d449a3fc0238ccf88741efeda72aec09e3cbec126f99f1d4145e4bc06e2756ac94a53a9fbcefa479665a94971519aa24ffce0d